← Back to Home

Privacy Policy

Last Updated: November 28, 2025

TL;DR: We use zero-knowledge encryption. We cannot see your files or passwords. We collect minimal data and delete everything within 1-24 hours (based on your selection).

1. Information We Collect

We DO NOT collect:

We DO collect:

Note: IP addresses are not stored in our database. Server logs may temporarily contain IP addresses for security purposes but are deleted after 7 days.

2. How We Use Your Information

The minimal data we collect is used solely for:

3. Zero-Knowledge Architecture

rcrypt uses zero-knowledge encryption:

4. Data Retention

All data is automatically deleted:

5. Data Storage

Your encrypted files are stored on:

6. Third-Party Services

We use the following third-party services:

We do NOT use:

7. Analytics

We use self-hosted Umami Analytics to understand how our service is used and improve user experience. Umami is a privacy-focused, open-source analytics platform.

What we collect through analytics:

What we DON'T collect:

Analytics data storage:

Opting out: You can opt out by enabling "Do Not Track" in your browser settings, or by using browser extensions that block analytics scripts.

8. Your Rights

Under GDPR and CCPA, you have the right to:

9. Security Measures

We implement industry-standard security:

10. Children's Privacy

rcrypt does not knowingly collect information from children under 13. The service is intended for general audiences. No age verification is required as we collect no personal information.

11. International Users

rcrypt is operated from the United States. By using the service, you consent to the transfer of data to the US. We comply with GDPR for EU users and CCPA for California residents.

12. Changes to This Policy

We may update this privacy policy. Changes will be posted on this page with an updated "Last Updated" date. Continued use of the service constitutes acceptance of changes.

13. Contact

For privacy questions or concerns, contact us at:

Email: soorena@pm.me

Remember: We use zero-knowledge encryption. We cannot access your files or passwords, even if we wanted to. Your privacy is built into the architecture, not just our policy.